Cybersecurity Training
Your Team Actually Needs
Practical, no-nonsense security training tailored for your organization. From emerging threat awareness to hands-on CTF competitions — protect your company from the inside out.
// Threat Landscape 2025–2026
Real attack vectors targeting organizations right now. This is what your team needs to recognize and defend against.
Quishing (QR Code Phishing)
HIGHMalicious URLs hidden in QR codes — in emails, PDF invoices, and physical signage. These bypass email security filters and redirect victims to credential-harvesting sites on unmanaged mobile devices, outside your EDR monitoring reach. Used by nation-state actors including North Korea's Kimsuky group.
AI Agent Hijacking
CRITICALPrompt injection attacks on LLM-powered business tools. Attackers poison documents, websites, and knowledge bases to manipulate AI assistants into leaking sensitive data or performing unauthorized actions — a zero-click attack on your AI infrastructure that traditional security tools cannot detect.
MFA Fatigue Attacks
HIGHBombardment of push authentication requests at 3 AM until an exhausted employee approves one. Combined with credentials from info-stealer malware, this technique reliably bypasses multi-factor authentication even in well-protected environments.
Initial Access Brokers
HIGHA criminal marketplace where specialized hackers sell network access to ransomware gangs, data thieves, or nation-state actors. Your compromised VPN credentials could be on sale right now — prices range from $500 for small businesses to $100,000+ for enterprise networks.
Supply Chain Infiltration
CRITICALAttackers compromise your trusted third-party providers, then pivot into your network through established trust relationships. In 2025, the Scattered Spider group used this technique to breach multiple major UK retailers simultaneously via a single service provider.
Autonomous AI Reconnaissance
EMERGINGAI agents that automatically scrape social media, company websites, and public databases to build detailed employee profiles, map organizational hierarchies, and craft hyper-personalized spear-phishing campaigns — all without human intervention and at unprecedented scale.
// Training Programs
Each program is adapted to your company's risk profile, industry, and technical maturity.
DORA Compliance Training
Prepare your financial institution for the Digital Operational Resilience Act. Covers ICT risk management, incident reporting, and third-party oversight requirements.
End-User Awareness
Phishing recognition, password hygiene, social engineering defense, and safe data handling. Engaging sessions that change real behavior, not just check a box.
Board & Executive Briefings
Strategic cybersecurity oversight for decision-makers. Understand cyber risk in business terms, regulatory obligations, and what questions to ask your CISO.
Cybersecurity Trends
What's new in the threat landscape and how to defend against it. Covers the latest attack vectors, emerging risks, and practical protection strategies. The program is tailored to the participant level — from general awareness for end users to technical deep-dives for IT specialists.
// Where to Learn
My cybersecurity courses are available through trusted education partners or as a custom program tailored to your needs.
Baltijas Datoru Akadēmija
Cybersecurity fundamentals course at one of the Baltic region's leading IT education providers. Structured curriculum for professionals looking to build a solid security foundation.
View Course →Possible Security
IT security training programs available through Possible Security. Browse the full catalog of courses — from foundational security awareness to advanced topics — several of which I deliver as instructor.
View Programs →Individual Programs
Need something specific? I design custom cybersecurity training programs tailored to your organization's industry, tech stack, threat model, and compliance requirements.
Get in Touch →// Cybersecurity Competitions
Turn cybersecurity training into an engaging team event. I organize internal Capture The Flag (CTF) competitions — a fun, gamified challenge where participants solve security puzzles, crack codes, and compete for the top of the leaderboard.
Tasks can be designed for complete beginners as well as experienced IT specialists, and tailored to your company's specific industry, tech stack, and security priorities. Organized in partnership with Mārtiņa-CTF, it's one of the most memorable ways to build security awareness and discover hidden talent in your team.
// About Me
I'm Daniels Heincis, a cybersecurity professional with 5+ years of hands-on experience in the field. I've trained more than 800 people across companies of various sizes and industries.
My approach is practical — I focus on real threats your organization faces, not theoretical scenarios. Whether it's preparing your team for DORA compliance, running a CTF competition, or making sure your board understands cyber risk, I deliver training that sticks.